CVE-2024-21923

7.3 HIGH

📋 TL;DR

AMD StoreMI software versions before 3.2.0.031 have incorrect default permissions that could allow a local attacker to escalate privileges. This affects Windows systems with AMD StoreMI installed, potentially enabling arbitrary code execution with elevated system privileges.

💻 Affected Systems

Products:
  • AMD StoreMI
Versions: Versions before 3.2.0.031
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD StoreMI software installed. AMD StoreMI is a storage acceleration technology for AMD platforms.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/root privileges and executes arbitrary code, potentially taking full control of the system.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrative/system access to install persistent malware or access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems with no critical data exposure.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users or compromised accounts could exploit this for lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system. Exploitation likely involves manipulating file permissions or service configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.0.031 or later

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4010.html

Restart Required: Yes

Instructions:

1. Download AMD StoreMI version 3.2.0.031 or later from AMD website. 2. Run the installer. 3. Follow on-screen instructions. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Uninstall AMD StoreMI

windows

Remove the vulnerable software entirely if not needed

Control Panel > Programs > Uninstall a program > Select AMD StoreMI > Uninstall

Restrict local access

all

Limit physical and remote access to affected systems

🧯 If You Can't Patch

  • Isolate affected systems from critical network segments
  • Implement strict local access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check AMD StoreMI version in Control Panel > Programs > Programs and Features. Versions before 3.2.0.031 are vulnerable.

Check Version:

wmic product where name='AMD StoreMI' get version

Verify Fix Applied:

Verify AMD StoreMI version shows 3.2.0.031 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • AMD StoreMI service manipulation attempts
  • File permission changes in StoreMI directories

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%StoreMI%' AND NewProcessName LIKE '%cmd%' OR '%powershell%'

🔗 References

📤 Share & Export